An automated method is provided for activating a nfc application in a mobile interface device. In this method, the device receives from a beacon a wireless beacon signal comprising at least one beacon identifier. The wireless beacon signal is processed by the mobile interface device to determine the at least one beacon identifier. The mobile interface device determines based on the at least one beacon identifier, whether to activate the nfc application. Responsive to a determination that the nfc application should be activated, the mobile interface device transitions the nfc application from a passive state to an active state. nfc communication is then established between the mobile interface device and at least one nfc transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range.
|
1. An automated method of activating a near field communication (nfc) application in a mobile interface device, the nfc application having an active state in which the mobile interface device is capable of nfc communication and a passive state in which the mobile interface device is incapable of nfc communication, the method comprising:
receiving, by the mobile interface device from a beacon having a beacon location and an associated beacon range, a wireless beacon signal comprising at least one beacon identifier;
processing the wireless beacon signal by the mobile interface device to determine the at least one beacon identifier;
determining, by the mobile interface device based on the at least one beacon identifier, whether to activate the nfc application;
responsive to a determination that the nfc application should be activated, transitioning, by the mobile interface device, the nfc application from the passive state to the active state; and
establishing nfc communication between the mobile interface device and at least one nfc transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range.
12. A mobile interface device, comprising:
a data processor;
a wireless communication interface in communication with the data processor and configured for selective communication over a wireless network;
a near field communication (nfc) interface;
a beacon signal receiver;
a user interface comprising at least a user input device and a display;
a memory accessible by the data processor, the memory having stored thereon
an nfc application having a passive state and an active state, the nfc application including instructions for the data processor to receive a signal from an nfc transmitting device via the nfc interface when the nfc application is in the active state and to prevent reception of nfc signals when the nfc application is in the passive state, and
a beacon monitoring application including instructions for the data processor to receive a wireless beacon signal from a beacon via the beacon signal receiver;
process the wireless beacon signal to identify the beacon;
determine if the beacon is an authorized beacon;
responsive to a determination that the beacon is an authorized beacon, transition the nfc application from the passive state to the active state.
19. A near field communication (nfc) system comprising:
a beacon for transmitting a beacon signal comprising at least one beacon identifier, the beacon having a beacon location and an associated beacon range;
an nfc transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range; and
a user interface device comprising
a data processor;
a near field communication (nfc) interface;
a beacon signal receiver;
a memory accessible by the data processor, the memory having stored thereon
an nfc application having a passive state and an active state, the nfc application configured for allowing communication between the data processor and the nfc transmitting device via the nfc interface when the nfc application is in the active state and preventing communication between the data processor and the nfc transmitting device via the nfc interface when the nfc application is in the passive state, and
a beacon monitoring application configured for instructing the data processor to receive the beacon signal from the beacon via the beacon signal receiver;
determine if the beacon is an authorized beacon; and
responsive to a determination that the beacon is an authorized beacon, cause the nfc application to change from the passive state to the active state.
2. An automated method according to
monitoring the beacon signal by the mobile interface device to detect a drop in beacon signal strength below a threshold value.
3. An automated method according to
responsive to detecting a drop in beacon signal strength below the threshold value, transitioning, by the mobile interface device, the nfc application from the active state to the passive state.
4. An automated method according to
responsive to detecting a drop in beacon signal strength below the threshold value, initiating, by the mobile interface device, a timed sequence having a predetermined duration;
responsive to a detection of an increase in beacon signal strength above the threshold value during the timed sequence, terminating the timed sequence by the mobile interface device; and
upon the timed sequence reaching the predetermined duration without the increase in beacon signal strength above the threshold value, the mobile interface device
terminating the timed sequence, and
transitioning the nfc application from the active state to the passive state.
5. An automated method according to
during the timed sequence, the mobile interface device carrying out at least one action from the set consisting of
transmitting exit information to a server via a network,
carrying out exit instructions received from a server via a network, and
carrying out exit instructions stored on the mobile interface device.
6. An automated method according to
displaying a visual message to the user; and
sounding an audible message to the user.
7. An automated method according to
receiving, by the mobile interface device, triggering information from the at least one nfc transmitting device; and
responsive to the triggering information, the mobile interface device carrying out at least one action from the set consisting of
transmitting information to a server via a network,
launching an application stored on the mobile interface device, and
initiating a transaction with a merchant device associated with the at least one nfc transmitting device.
8. An automated method according to
comparing the at least one beacon identifier to a predetermined list of authorized beacon identifiers each associated with an authorized merchant.
9. An automated method according to
transmitting the at least one beacon identifier to a central server; and
receiving from the central server a beacon authorization indication.
10. An automated method according to
11. An automated method according to
determining a signal strength for the wireless beacon signal,
wherein the actions of processing the wireless beacon signal, determining whether to activate the nfc application, transitioning the nfc application from a passive state to an active state, and establishing nfc communication are carried out only if the signal strength exceeds a threshold strength value.
13. A mobile interface device according to
monitor the beacon signal to detect a drop in beacon signal strength below a threshold value.
14. A mobile interface device according to
transition the nfc application from the active state to the passive state if the beacon signal strength drops below the threshold value.
15. A mobile interface device according to
transmitting exit information to a server over the network via the wireless communication interface,
carrying out exit instructions received from a server over the network via the wireless communication interface, and
carrying exit instructions stored in the memory.
16. A mobile interface device according to
displaying a visual message to the user; and
sounding an audible message to the user.
17. A mobile interface device according to
the beacon signal includes a beacon identifier,
the memory has a list of authorized beacon identifiers stored therein, and
the action to determine if the beacon is an authorized beacon includes comparing the beacon identifier to the list of authorized beacon identifiers.
18. A mobile interface device according to
|
This application claims priority to U.S. Provisional Patent Application 62/679,571, filed Jun. 1, 2018, the complete disclosure of which is incorporated herein by reference.
This application relates generally to communication with contactless interfaces (e.g., radio-frequency identification (RFID) tags and other near field communication (NFC) devices) and device enhancement, and, more particularly, to beacon-triggered activation of an NFC application in a mobile interface device.
In the related art, the functionality of contactless interface points and readers (e.g., RFID and other NFC devices) typically provides for the acquiring of a single source of static information. This static information provision does not provide for nuanced device and function management. Accordingly, there is a need for improved systems and methods to provide enhancements to contactless interface points, contactless interface point functionality, and contactless interface point readers, including user devices. Embodiments of the present disclosure are directed to these and other considerations.
An illustrative aspect of the invention provides an automated method of activating a NFC application in a mobile interface device. The method comprises receiving, by the mobile interface device from a beacon having a beacon location and an associated beacon range, a wireless beacon signal comprising at least one beacon identifier. The wireless beacon signal is processed by the mobile interface device to determine the at least one beacon identifier. The method further comprises determining, by the mobile interface device based on the at least one beacon identifier, whether to activate the NFC application. Responsive to a determination that the NFC application should be activated, the mobile interface device transitions the NFC application from a passive state to an active state. The method also comprises establishing NFC communication between the mobile interface device and at least one NFC transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range.
Another aspect of the invention provides a mobile interface device comprising a data processor, a wireless communication interface in communication with the data processor and configured for selective communication over a wireless network, a near field communication (NFC) interface, a beacon signal receiver, a user interface comprising at least a user input device and a display, and a memory accessible by the data processor. The memory has stored thereon an NFC application having a passive state and an active state. The NFC application includes instructions for the data processor to receive a signal from an NFC transmitting device via the NFC interface when the NFC application is in the active state. The memory also has stored thereon a beacon monitoring application. The beacon monitoring application includes instructions for the data processor to receive a wireless beacon signal from a beacon via the beacon signal receiver, process the wireless beacon signal to identify the beacon, and determine if the beacon is an authorized beacon. Responsive to a determination that the beacon is an authorized beacon, the data processor is instructed to transition the NFC application from the passive state to the active state.
Another aspect of the invention provides an NFC system comprising a beacon for transmitting a beacon signal comprising at least one beacon identifier. The beacon has a beacon location and an associated beacon range. The NFC system further comprises an NFC transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range. The NFC system also comprises a user interface device comprising a data processor, an NFC interface, a beacon signal receiver, and a memory accessible by the data processor. The memory has stored thereon an NFC application having a passive state and an active state. The NFC application is configured for allowing communication between the data processor and the NFC transmitting device via the NFC interface when the NFC application is in the active state. The memory also has stored thereon a beacon monitoring application. The beacon monitoring application is configured for instructing the data processor to receive the beacon signal from the beacon via the beacon signal receiver and determine if the beacon is an authorized beacon. Responsive to a determination that the beacon is an authorized beacon, the data processor is instructed to cause the NFC application to change from the passive state to the active state.
The invention can be more fully understood by reading the following detailed description together with the accompanying drawings, in which like reference indicators are used to designate like elements, and in which:
Some implementations of the disclosed technology will be described more fully with reference to the accompanying drawings. This disclosed technology may, however, be embodied in many different forms and should not be construed as limited to the implementations set forth herein. The components described hereinafter as making up various elements of the disclosed technology are intended to be illustrative and not restrictive. Many suitable components that would perform the same or similar functions as components described herein are intended to be embraced within the scope of the disclosed electronic devices and methods. Such other components not described herein may include, but are not limited to, for example, components developed after development of the disclosed technology.
It is also to be understood that the mention of one or more method steps does not preclude the presence of additional method steps or intervening method steps between those steps expressly identified. Similarly, it is also to be understood that the mention of one or more components in a device or system does not preclude the presence of additional components or intervening components between those components expressly identified.
Although RFIDs, RFID stickers, RFID devices, RFID kiosks, etc., are generally used herein, these are merely examples. One of ordinary skill will recognize that, in light of the present disclosure, the RFID technology may be substituted or augmented with various types of contactless or wireless technologies. As non-limiting examples, various aspects of the present disclosure may utilize one or more of NFC tags, RFID stickers, and NXP MIFARE stickers, image codes (e.g., one- or two dimensional barcodes or QR codes), as well as interface points for different frequency readers (e.g., readers attuned to non-traditional contactless interface point tunings), and contactless interface points designed for different technologies (e.g., sonic readers or X-ray readers) may be used in addition to or in place of RFID devices.
User device 110 may include, as non-limiting examples, a mobile interface device (e.g., a smart phone, tablet computer, smart wearable device, portable laptop computer, voice command device, or other mobile computing device) or a stationary computing device (e.g., a stationary desktop or other stationary computer). In some embodiments, user device 110 may be configured to interact with one or more of service provider terminal 120, service provider database system 130, merchant terminal 140, merchant database system 150, beacon 170, and NFC device 180, either directly or over network 190. User device 110 and may be equipped with a display, speakers or other auditory devices, tactile simulators, haptic sensors, cameras, light projectors, input devices, distance measuring equipment, 3D scanners, IR sensors, microphones, orientation/position/location sensors, accelerometers, and other devices.
An exemplary embodiment of service provider terminal 120 is shown in more detail in
A peripheral interface may include the hardware, firmware and/or software that enables communication with various peripheral devices, such as media drives (e.g., magnetic disk, solid state, or optical disk drives), other processing devices, or any other input source used in connection with the instant techniques. In some embodiments, a peripheral interface may include a serial port, a parallel port, a general purpose input and output (GPIO) port, a game port, a universal serial bus (USB), a micro-USB port, a high definition multimedia (HDMI) port, a video port, an audio port, a Bluetooth™ port, a near-field communication (NFC) port, another like communication interface, or any combination thereof.
In some embodiments, a transceiver may be configured to communicate with compatible devices and ID tags when they are within a predetermined range. A transceiver may be compatible with, for example, one or more of: radio-frequency identification (RFID), near-field communication (NFC), Bluetooth™, low-energy Bluetooth™ (BLE), WiFi™, ZigBee™, Z-Wave™, ambient backscatter communications (ABC) protocols or similar technologies.
A mobile network interface may provide access to a cellular network, the Internet, or another wide-area network. In some embodiments, a mobile network interface may include hardware, firmware, and/or software that allows the processor(s) 210 to communicate with other devices via wired or wireless networks, whether local or wide area, private or public, as known in the art. A power source may be configured to provide an appropriate alternating current (AC) or direct current (DC) to power components.
Processor 210 may include one or more of a microprocessor, microcontroller, digital signal processor, co-processor or the like or combinations thereof capable of executing stored instructions and operating upon stored data. Memory 230 may include, in some implementations, one or more suitable types of memory (e.g. such as volatile or non-volatile memory, random access memory (RAM), read only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash memory, a redundant array of independent disks (RAID), and the like), for storing files including an operating system, application programs (including, for example, a web browser application, a widget or gadget engine, and or other applications, as necessary), executable instructions and data. In one embodiment, the processing techniques described herein are implemented as a combination of executable instructions and data within the memory 230.
Processor 210 may be one or more known processing devices, such as, but not limited to, a microprocessor from the Pentium™ family manufactured by Intel™ or the Turion™ family manufactured by AMD™. Processor 210 may constitute a single core or multiple core processor that executes parallel processes simultaneously. For example, processor 210 may be a single core processor that is configured with virtual processing technologies. In certain embodiments, processor 210 may use logical processors to simultaneously execute and control multiple processes. Processor 210 may implement virtual machine technologies, or other similar known technologies to provide the ability to execute, control, run, manipulate, store, etc. multiple software processes, applications, programs, etc. One of ordinary skill in the art would understand that other types of processor arrangements could be implemented that provide for the capabilities disclosed herein.
Service provider terminal 120 may include one or more storage devices configured to store information used by processor 210 (or other components) to perform certain functions related to the disclosed embodiments. In one example, service provider terminal 120 may include memory 230 that includes instructions to enable processor 210 to execute one or more applications, such as server applications, network communication processes, and any other type of application or software known to be available on computer systems. Alternatively, the instructions, application programs, etc. may be stored in an external storage or available from a memory over a network. The one or more storage devices may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other type of storage device or tangible computer-readable medium.
In one embodiment, service provider terminal 120 may include memory 230 that includes instructions that, when executed by processor 210, perform one or more processes consistent with the functionalities disclosed herein. Methods, systems, and articles of manufacture consistent with disclosed embodiments are not limited to separate programs or computers configured to perform dedicated tasks. For example, service provider terminal 120 may include memory 230 that may include one or more programs 250 to perform one or more functions of the disclosed embodiments. Moreover, processor 210 may execute one or more programs 250 located remotely from system 100. For example, system 100 may access one or more remote programs 250, that, when executed, perform functions related to disclosed embodiments.
Memory 230 may include one or more memory devices that store data and instructions used to perform one or more features of the disclosed embodiments. Memory 230 may also include any combination of one or more databases controlled by memory controller devices (e.g., server(s), etc.) or software, such as document management systems, Microsoft™ SQL databases, SharePoint™ databases, Oracle™ databases, Sybase™ databases, or other relational databases. Memory 230 may include software components that, when executed by processor 210, perform one or more processes consistent with the disclosed embodiments. In some embodiments, memory 230 may include one or more databases 260, for storing related data to enable service provider terminal 120 to perform one or more of the processes and functionalities associated with the disclosed embodiments.
Service provider terminal 120 may also be communicatively connected to one or more memory devices (e.g., databases (not shown)) locally or through a network. The remote memory devices may be configured to store information and may be accessed and/or managed by service provider terminal 120. By way of example, the remote memory devices may be document management systems, Microsoft™ SQL databases, SharePoint™ databases, Oracle™ databases, Sybase™ databases, or other relational databases. Systems and methods consistent with disclosed embodiments, however, are not limited to separate databases or even to the use of a database.
Service provider terminal 120 may also include one or more I/O devices 220 that may comprise one or more interfaces for receiving signals or input from devices and providing signals or output to one or more devices that allow data to be received and/or transmitted by service provider terminal 120. For example, service provider terminal 120 may include interface components, which may provide interfaces to one or more input devices, such as one or more keyboards, mouse devices, touch screens, track pads, trackballs, scroll wheels, digital cameras, microphones, sensors, and the like, that enable service provider terminal 120 to receive data from one or more users (such as via user terminal 120).
In exemplary embodiments of the disclosed technology, service provider terminal 120 may include any number of hardware and/or software applications that are executed to facilitate any of the operations. The one or more I/O interfaces may be utilized to receive or collect data and/or user instructions from a wide variety of input devices. Received data may be processed by one or more computer processors as desired in various implementations of the disclosed technology and/or stored in one or more memory devices.
While service provider terminal 120 has been described as one form for implementing the techniques described herein, those having ordinary skill in the art will appreciate that other, functionally equivalent techniques may be employed. For example, as known in the art, some or all of the functionality implemented via executable instructions may also be implemented using firmware and/or hardware devices such as application specific integrated circuits (ASICs), programmable logic arrays, state machines, etc. Furthermore, other implementations of the terminal 120 may include a greater or lesser number of components than those illustrated.
Service provider database 130 may have one or more processors 132 and one or more memory 134, which may be any suitable repository of merchant data. Service provider 130 may be located at a service provider database 130 location, off-site at another service provider location, or at a third-party location. Information stored in memory 134 may be accessed (e.g., retrieved, updated, and added to) via network 190 by one or more devices (e.g., service provider terminal 120). Memory 134 may store information relating to, as non-limiting examples, a user profile, RFID and/or beacon configurations, and merchant information.
Merchant terminal 140 may have one or more POS devices 142 that communicate with one or more devices (e.g., user device 110) via network 190. In some embodiments, POS device 162 may communicate with one or more devices (e.g., user device 110) using short-range communication.
Merchant database 150 may have one or more processors 152 and one or more memory 154, which may be any suitable repository of merchant data. Merchant database 150 may be located at the POS location, off-site at another merchant location, or at a third-party location. Information stored in memory 154 may be accessed (e.g., retrieved, updated, and added to) via network 190 by one or more devices (e.g., service provider terminal 120) of system environment 100. Memory 154 may store information relating to products and services offered by merchants such as pricing, quantity, availability, discounts, reviews, and any other such generally available information that a consumer may utilize in making a purchasing decision. In some embodiments, memory 154 may also include location information associated with products and services that identifies the location(s) that a particular product or service is available for purchase. In some embodiments, the location information may include an identification of a particular store, terminal, or kiosk that the product or service may be purchased from.
Beacon 170 may output a signal (e.g., constantly, periodically, or randomly). In some embodiments, one or more of the beacons 170 may be positioned proximate a POS location and configured to output a signal to one or more other devices of the system 100 that are within a predetermined range of the respective beacon 170 (e.g., to user device 110 of a customer walking through a store). The signal may include preset information. For example, the information may be detected by the user device 110 (e.g., an application executing on the user device 110), which triggers the user device 110 to perform some action. In some cases, beacon 170 may be modified (e.g., to change the information transmitted or the transmission pattern/strength). Beacon 170 may be connected to network 190, and may be, as a non-limiting example, modified by service provider terminal 120.
The signal of a beacon 170 may contain two numbers referred to herein as the beacon's major and minor identifiers. These identifiers may be used to identify the beacon's location. In particular applications, the beacon's major identifier may be associated with a relatively large area or building (e.g., a store or other business) in which multiple beacons may be positioned. In such applications, the minor identifier may be associated with a smaller area (e.g., a retail department) that is within the larger area and within which the particular beacon is located. In some applications, the beacon's signal may also include a source identifier that identifies the controlling entity (e.g., a merchant) associated with the beacon. As is discussed in more detail below, the user device 110 may be configured, not only to detect the signal from a beacon 170, but to determine a signal strength as well. This may allow the determination of a distance from the beacon 170.
NFC device 180 may be any form of NFC transmitter and/or receiver. In particular embodiments, the NFC device 180 may be or comprise an RFID transmitter or receiver. Such a device may be active or passive and may be in communication with other RFID-capable devices in the system 100. In some embodiments, the NFC device 180 may be configured to broadcast predetermined information, thereby acting as an NFC transmitter configured to communicate with an NFC reader. For example, user device 110 may receive (e.g., using an application) transmitted information from an NFC device 180. In some cases, user device 110 may then transmit the received information to service provider terminal 120. Service provider terminal 120 may reference data stored in service provider database system 130 to determine what trigger NFC device 180 represents. For example, in some cases, NFC device 180 may be associated with a location either directly (embedded NFC device information) or indirectly (NFC device information is a location pointer), and confirmation of user device 110 being within a predetermined range of that location may trigger one or more predetermined actions or steps of a method described herein. In some cases, service provider terminal 120 may transmit the interpretation of the data back to user device 110.
While the NFC device 180 may often be an RFID device, this is merely an example, and one of ordinary skill will recognize that various different types of contactless interface points may be utilized in system environment 100. For example, one or more of NFC tags, RFID stickers, and NXP MIFARE stickers, as well as interface points for different frequency readers (e.g., readers attuned to non-traditional contactless interface point tunings), non IoT devices, and contactless interface points designed for different technologies (e.g., sonic readers or X-ray readers) may be used within system environment 100. User device 110 may receive and read transmissions from the various types of contactless interface points in similar manner as discussed herein, or as modified in a manner understood by one of ordinary skill in light of the present disclosure. The user device 110 may utilize the information gathered from the various NFC devices 180, for example, as “location-based IDs,” as triggers to perform a function, or to contact a database for more information, as will be discussed in greater detail below.
Network 190 may be of any suitable type, including individual connections via the internet such as cellular or WiFi networks. In some embodiments, network 190 may connect terminals using direct connections such as radio-frequency identification (RFID), near-field communication (NFC), Bluetooth', low-energy Bluetooth' (BLE), WiFi™, ZigBee', Z-Wave', ambient backscatter communications (ABC) protocols, USB, or LAN. Because the information transmitted may be personal or confidential, security concerns may dictate one or more of these types of connections be encrypted or otherwise secured. In some embodiments, however, the information being transmitted may be less personal, and therefore the network connections may be selected for convenience over security.
Location based services (LBS) are often dependent on GPS and user-confirmed tracking input. In the related art, users may be prompted by the LBS to select their locations when GPS is unavailable. For example, GPS is often unreliable when inside a building (e.g., inside a mall), so LBSs rely on user-selected locations to determine what store a user is in. This can lead to LBS location requests out of context to where the LBSs would be useful. Thus, users may be inconvenienced by inconsistent LBS availability, and annoyed by unwarranted LBS requests. Accordingly, users may deactivate, deactivate, or otherwise limit the LBS and related capabilities, which decreases user engagement and LBS utility. Accordingly, certain aspects of the present disclosure relate to the use of contactless interface points (e.g., RFIDs) to provide location information, which may be used to improve LBS services.
In some cases, reading the device may not operate as a strict opt-in to an LBS (i.e., may not have include the user electing to receive future messages of LBS services), but rather provide a user initiated call for information (e.g., from a database). Accordingly, instead of the traditional LBS PUSH content/marketing, there may be provided LBS PULL content/marketing (e.g., a user has precise control over when, where and how they receive the content or marketing materials). For example, a user can “initiate a call” for discount coupons or customer service at precise location by using the user device to read the contactless interface point, and the database may trigger action rules that send out a 10% off discount to customer account or send out a notification to customer service, so customer service can contact the customer at this specify location.
As a non-limiting example, consider two users “A” and “B” in a same location at the same time. Both users use their user devices to read contactless interface points at the location and provide the location information to the database. The database determines location-based rules and user preferences, and then the database sends respective triggers (e.g., different triggers) to the user devices. Accordingly, User A may receive a discount, and User B might be provided new product introduction, despite reading a same contactless interface point at a same time.
In many instances, a user's mobile device may require an action to place it in an active state for receiving NFC transmissions. By not having a default active state, a hurdle is placed between the user and ready NFC communication. This can create inefficiencies in, for example, reading RFID signals using a mobile interface device (e.g., a smartphone). An aspect of the present invention is to make use of beacon technology to automatically activate and deactivate an NFC reader of a user device (particularly, a mobile interface device) without a required action on the part of the user. This provides significant improvements in efficiency and other functional advantages over the related art.
The NFC devices 480 may be any NFC enabled transmitter and/or receiver positioned within the retail store. Each NFC device 480 may be specifically configured for communication with NFC-enabled user devices. In some embodiments, some or all of the NFC devices 480 may be part of or associated with merchant terminals and/or POS devices within the retail store.
As shown in
The user interface 414 includes a user input mechanism, which can be any device for entering information and instructions into the user device 410, such as a touch-screen, keyboard, mouse, cursor-control device, microphone, stylus, or digital camera. The user interface 414 may also include a display, which can be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays.
The communication interface 412 is in data communication with the data processor 411 and is configured to establish and support wired or wireless data communication capability for connecting the device 410 to a communication network.
The beacon monitor 415 is in data communication with the data processor 411 and is configured to receive and process transmissions from the one or more beacons 470 via an antenna 416 or other beacon signal receiver, convert the signal to digital data, and forward the digital data to the data processor 411. The beacon monitor 415 may further be configured to determine the signal strength of a received transmission.
The NFC interface 419 is in data communication with the data processor 411 and is configured for establishing near field communication with any of the one or more NFC devices 480. Information received via the NFC interface 419 is forwarded to the data processor 411.
In various embodiments of the invention, the memory 413 may have stored therein one or more applications each comprising a plurality of instructions usable by the data processor 411 to conduct and/or monitor transactions between the user device 410 and merchant terminals, service providers, and transaction processing servers. These applications may include instructions usable by the data processor 411 to identify transaction events, store event data in the memory 413, and communicate event data to a transaction processor and/or a transaction monitoring system. Some applications may also include instructions relating to receiving and interpreting instructions from the transaction processor or transaction monitoring system.
The memory 413 has stored therein an NFC application comprising a plurality of instructions usable by the data processor 411 to establish communication with an NFC transmission device via the NFC interface 419. The NFC application is configured to have an active state in which placement of the user device 410 in contact with or within a predetermined NFC communication distance of an NFC device 480 causes the NFC device 480 to transmit information receivable via the NFC interface 419. The NFC application is further configured to have a passive state in which NFC communication is not established when the user device 410 is placed in contact with or within the predetermined NFC communication distance of an NFC device 480.
The memory 413 also has stored therein a beacon monitoring application. The beacon monitoring application is operable as a background application comprising a plurality of instructions usable by the data processor 411 to receive and process signal data from the beacon monitor 415. The beacon monitoring application is configured, in particular, to determine from the signal data, location identity information for the beacon 470 broadcasting the signal from which the signal data is derived. Depending on the application, the location identity information may include one or both of the major and minor location identifiers of the broadcasting beacon 470. The beacon monitoring application may be further configured to use the location identity information to determine a location of the beacon 470. This may be accomplished by comparing the location identity information to known beacon information stored in the memory 413. Alternatively, the location identity information may be transmitted to a central processor, which determines and returns the location of the beacon to the user device 410.
The beacon monitoring application may be further configured to determine, based on predetermined activation criteria whether the NFC interface should be changed from its passive state to its active state in response to the received beacon transmission. The activation criteria may include particular location identity information, beacon location, and signal strength. The activation criteria may also include or be varied based on timing and geographic considerations. In a particular example, the activation criteria may simply be that the signal is received from a beacon 470 having a major location identifier matching one of a list of identifiers associated with stores of a particular retail chain. In another example, the activation criteria might further include a requirement that the signal strength exceed an activation threshold value.
Upon determining that a beacon signal meeting the activation criteria has been encountered, the beacon monitoring application activates the NFC application (i.e., instructs the NFC application to move from its passive state to its active state). The beacon monitoring application may be still further configured to continue monitoring the beacon transmission after the NFC application has been activated. In particular embodiments, the application is configured to determine that deactivation criteria has been met, and, in response, deactivating the NFC application. In some applications, deactivation criteria may be or include the passage of a predetermined time interval after activation. In other applications, the deactivation criteria may be the loss of the beacon signal (at all or for at least a predetermined interval). In yet other applications, the deactivation criteria may include signal strength falling below a deactivation threshold value (at all or for at least a predetermined interval).
In some embodiments, the beacon monitoring application may be configured to detect a second beacon 470 and to determine if the second beacon has the same major location identifier as the first beacon 470. In such embodiments, the deactivation criteria may be established so that the NFC application remains active as long as a signal is being received from any beacon 470 having the same major location identifier as the beacon 470 whose signal originally triggered activation of the NFC application.
The above-described user device 410 provides for a seamless, hands-off user experience in which the user need not even be aware of the active or passive state of the NFC application. If desired, however, either the beacon monitoring application or the NFC application may be configured to notify the user via the user interface that the state of the NFC application has changed. In certain embodiments, a notification may be presented to the user prior to any such state change, the state change only taking place on receipt of user confirmation.
In an exemplary scenario, a user may cause the user device 410 to execute the beacon monitoring application in the background to detect beacons 470. When the user enters the broadcast area (or “zone”) of a recognized beacon 470, the beacon is detected by the user device 410 and the NFC reader application on the user device is activated. The user may then use the user device 410 to interact with NFC transmitters within the broadcast area. This would allow, for example, instant reading of RFID information at a given location or touchpoint. Once the RFID information has been read, the user device 410 may operate in accordance with the discussion of other example embodiments herein. For example, the user device may output location information to a network, launch an application, launch a mobile function, or execute a transaction. All without the requirement that the user activate the NFC capability of the device. Thus, the combination of disparate technologies provides significant improvement to NFC and beacon technology application.
Continuing the exemplary scenario, when the user leaves the beacon's broadcast area, immediately or shortly thereafter, the NFC application will revert to its passive state. In some instances, leaving the beacon zone may trigger an additional or alternative action of the user device (e.g., an action in addition to or instead of transitioning to the NFC passive state). For example, if the beacon zone is in a store, leaving the beacon zone without making a purchase may trigger a discount request from the user device.
Responsive to a determination that the activation criteria have been met, the NFC application of the user device 410 transitions from a passive state to an active state at S440. At S450, communication is established between the user device 410 and an NFC transmitting device (e.g., an RFID tag or POS device) disposed within the beacon transmission area. Additional NFC communications with other NFC transmitting devices can also be established. At S460, the user device 410 determines whether NFC deactivation criteria have been met. Responsive to the deactivation criteria being met, the NFC application of the user device 410 transitions from the active state to the passive state at S470. In some embodiments, the deactivation criteria is met if the signal is no longer being received or has not been received for longer than a predetermined time interval. In such embodiments, the action of determining would include monitoring the signal from the detected beacon 470 to determine if it is no longer being detected (e.g., due to the user having left the beacon transmission area). In some embodiments, the deactivation criteria is met when the signal strength of the transmission falls below a predetermined deactivation threshold or has been below that level for longer than a predetermined time interval. In such embodiments, the action of determining would include monitoring the level of the signal strength and comparing it to the deactivation threshold.
In some embodiments, meeting some or all of the deactivation criteria may trigger additional actions to be taken by the user device. Such actions may occur upon deactivation of the NFC application or may occur during a time interval triggered by loss of signal or drop in signal strength below a threshold level. These actions may include the user device transmitting a notification of the user's departure from the beacon area to a remote server over a communication network. This notification may include various exit information including, time of departure, time spent in the beacon area, transactions carried out, etc. Additional actions taken may include predetermined actions stored in the memory of the user device or received from the remote server. Such actions could include displaying visual and/or audible messages that could include, for example, notification that the user is leaving the beacon area and/or a plea to return (potentially with a promised discount). In some instances, the action could include the completion of a transaction initiated through NFC communications while inside the beacon area. For example, the user may have placed items in a virtual shopping cart via interaction with RFID tags within the beacon area. Departure from the beacon area (and, thus, meeting some or all of the deactivation criteria could trigger a “checkout” function to complete the purchase of the items in the shopping cart.
While traditionally only a single interaction is possible with RFID devices (i.e., an RFID is read or not), which limits the functionality of RFID devices to merely providing/acquiring to a single source of information, certain aspects of the present disclosure relate to the gesture-based interactions with one or more RFIDs.
As will be understood in light of the present disclosure, a gesture may be performed with a single RFID tag or a plurality of RFID tags. In some cases, a sequence of gestures may be performed with a plurality of RFID tags. For example, a user may tap the user device to three different RFID tags in different orders to invoke different function. In some cases, a sequence of gestures may be performed on a single RFID tag. For example, a user may tap user device to a first RFID tag, and then hover the user device over the RFID tag. In some cases, gestures performed with the one or more RFID tags may be combined with gestures performed on the user device. For example, a user may tap an RFID tag and shake the user device, which launching a first function, or tap the RFID tag and rotate the user device, which launches a second function. Thus, as non-limiting example of improvements to RFID technology, RFID communication, and user devices, certain aspects of the present disclosure utilize one or more from among: a plurality of RFID tags; a sequence of RFID tags; RFID gestures; a sequence of RFID gestures; user device gestures; time between RFID and/or user device gestures (e.g., shave and a haircut timing); and accelerometer data. Accordingly, certain aspects of the present disclosure, working with a single or series of RFID tags, may exponentially extend the gesture-based interaction potential.
In some cases, customers belong to numerous loyalty and/or rewards programs. However, the related art does not provide simple ways for users to aggregate promotional data or track their loyalty programs from multiple merchants. Moreover, in the related art, RFID information is static or otherwise difficult to change. Accordingly, certain aspects of the present disclosure relate to the use of RFID tags (e.g., RFID stickers) to collect promotional or incentive-based data.
The RFID information may be static or otherwise difficult to change. For example, the RFID information may include an identifier for the RFID sticker. Functionality associated with the RFID sticker may therefore be determined based on mappings in database 1 or database 2. The merchant databases may set or change the functionality associated with the RFID sticker, for example, but accessing database 2 over the network. As a non-limiting example, the RFID sticker may be placed a first merchant location (e.g., at a store entrance). Upon entering the store, the user may tap the RFID sticker. The user device reads and sends the RFID information to database 1. Database 1 requests that database 2 indicate functionality is associated with the RFID sticker ((e.g., functionality set by the corresponding merchant database). Database 2 may notify database 1 about the associated functionality, for example, a 10% discount on purchases that data. Database 1 may relay that information to the user device. Thus, the user is notified about the daily discount. Merchant database may adjust the meaning (e.g., value or action taken) associated with the RFID sticker as often as desired (e.g., daily or weekly), and the same RFID sticker may therefore be mapped to different information or functionality.
As discussed above, while the functionality of RFID devices readers is typically limited to the acquiring of a single source of information, certain aspects of the present disclosure relate to enhancement of RFID functionality addressing these and other issues.
The RFID information may be static or otherwise difficult to change. For example, the RFID information may include an identifier for the RFID sticker. The function associated with the RFID sticker may therefore be determined based on mappings in the merchant database. As a non-limiting example, the RFID may be provided to the user by the merchant. The RFID information may be associated with an account the user has with the merchant (e.g., a user account). For example, the user may log-in to the user account on the user device and scan the RFID sticker to associate the RFID sticker and/or its information with the user account. Thereafter, when the RFID sticker is read by the user device, the appropriate functionality will be performed. In some cases, a same RFID sticker may be independently associated with different user accounts/user devices, such that a first function will be executed when a first user device reads the RFID sticker, while a second function will be executed when the second user device reads the RFID sticker.
The RFID sticker's function may be enabled using, for example, if-this then-that ((IFTTT) applets. In some cases, the function may be an order command (e.g., when the user device reads the RFID sticker, an item is ordered from the merchant) or some other predefined trigger. In some cases, a user may log-into the user account to set or adjust the function associated with the RFID sticker for the user device. Accordingly, the function triggered by the RFID sticker may be reprogrammable, enhancing the functionality of RFID stickers (e.g., RFID tags) and RFID readers. In some cases, a user can utilize a graphical user interface to “program” (e.g., set or select) what happens when the user reads a particular tag (or performs particular gestures with the particular tag). For example, a user may determine (e.g., program or configure) whether reading an RFID sticker at a coffee shop records the user's visit for a loyalty program or places an order for the user's favorite coffee. As another example, a user may determine (e.g., program or configure) whether reading an RFID sticker on a laundry detergent box launches a browser to provide stain removal instructions, or reorders the detergent.
Some aspects of the present disclosure extend the RFID capability to allow customers, organizations, and/or merchants to tie mobile related actions within a user device. As non-limiting examples, a merchant could setup “dynamic promotions” so that users grab their devices and interact with the user (or the user RFID network); a user could setup a “re-order item” function for the RFID at home—tapping the RFID sticker with the user device would reorder the item; and an organization could setup “payment functions” associated with an RFID at a user's home (or rental)—tapping the RFID with the user device initiates the payment (e.g., rent payment, credit card payment, bank deposit, etc.).
While traditional private label merchant credit lines (e.g., merchant branded credit cards) are often maintained by third-parties, which can be expensive and have limited fraud detection/authorization check points that lead to unnecessary costs, certain aspects of the present disclosure relate to enhancement of RFID functionality addressing these and other issues.
In some cases, a plurality of RFID stickers may be dispersed throughout a merchant location (e.g., a store). The RFID stickers may, for example, be linked to discount/promotional codes or values, and/or specific items. Accordingly, as a user shops, selected items and discounts may be added to a user's virtual checkout “cart.” When a user scans a checkout RFID sticker (e.g., an RFID sticker at a designated checkout area), the scanning may trigger POS functionality of the user device. The user device may transmit the RFID information for the coupons and/or items to the server, and the server may inform the user device as to the transaction value. The user may then use the user device to finalize the transaction.
The computing device architecture 900 of
In an example implementation, the network connection interface 912 may be configured as a communication interface and may provide functions for rendering video, graphics, images, text, other information, or any combination thereof on the display. In one example, a communication interface may include a serial port, a parallel port, a general-purpose input and output (GPIO) port, a game port, a universal serial bus (USB), a micro-USB port, a high definition multimedia (HDMI) port, a video port, an audio port, a Bluetooth port, a near-field communication ((NFC) port, another like communication interface, or any combination thereof In one example, the display interface 904 may be operatively coupled to a local display, such as a touch-screen display associated with a mobile device. In another example, the display interface 904 may be configured to provide video, graphics, images, text, other information, or any combination thereof for an external/remote display 950 that is not necessarily connected to the mobile computing device. In one example, a desktop monitor may be used for mirroring or extending graphical information that may be presented on a mobile device. In another example, the display interface 904 may wirelessly communicate, for example, via the network connection interface 912 such as a Wi-Fi transceiver to the external/remote display 950.
The computing device architecture 900 may include a keyboard interface 906 that provides a communication interface to a keyboard. In one example implementation, the computing device architecture 900 may include a presence-sensitive display interface 908 for connecting to a presence-sensitive display 907. According to certain example implementations of the disclosed technology, the presence-sensitive display interface 908 may provide a communication interface to various devices such as a pointing device, a touch screen, a depth camera, etc. which may or may not be associated with a display.
The computing device architecture 900 may be configured to use an input device via one or more of input/output interfaces (for example, the keyboard interface 906, the display interface 904, the presence sensitive display interface 908, network connection interface 912, camera interface 914, sound interface 916, etc.) to allow a user to capture information into the computing device architecture 900. The input device may include a mouse, a trackball, a directional pad, a track pad, a touch-verified track pad, a presence-sensitive track pad, a presence-sensitive display, a scroll wheel, a digital camera, a digital video camera, a web camera, a microphone, a sensor, a smartcard, and the like. Additionally, the input device may be integrated with the computing device architecture 900 or may be a separate device. For example, the input device may be an accelerometer, a magnetometer, a digital camera, a microphone, and an optical sensor.
Example implementations of the computing device architecture 900 may include an antenna interface 910 that provides a communication interface to an antenna; a network connection interface 912 that provides a communication interface to a network. As mentioned above, the display interface 904 may be in communication with the network connection interface 912, for example, to provide information for display on a remote display that is not directly connected or attached to the system. In certain implementations, a camera interface 914 is provided that acts as a communication interface and provides functions for capturing digital images from a camera. In certain implementations, a sound interface 916 is provided as a communication interface for converting sound into electrical signals using a microphone and for converting electrical signals into sound using a speaker. According to example implementations, a random-access memory ((RAM) 918 is provided, where computer instructions and data may be stored in a volatile memory device for processing by the CPU 902.
According to an example implementation, the computing device architecture 900 includes a read-only memory (ROM) 920 where invariant low-level system code or data for basic system functions such as basic input and output (I/O), startup, or reception of keystrokes from a keyboard are stored in a non-volatile memory device. According to an example implementation, the computing device architecture 900 includes a storage medium 922 or other suitable type of memory (e.g. such as RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), where the files include an operating system 924, application programs 926 (including, for example, a web browser application, a widget or gadget engine, and or other applications, as necessary) and data files 928 are stored. According to an example implementation, the computing device architecture 900 includes a power source 930 that provides an appropriate alternating current (AC) or direct current (DC) to power components.
According to an example implementation, the computing device architecture 900 includes a telephony subsystem 932 that allows the device 900 to transmit and receive sound over a telephone network. The constituent devices and the CPU 902 communicate with each other over a bus 934.
According to an example implementation, the CPU 902 has appropriate structure to be a computer processor. In one arrangement, the CPU 902 may include more than one processing unit. The RAM 918 interfaces with the computer bus 934 to provide quick RAM storage to the CPU 902 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, the CPU 902 loads computer-executable process steps from the storage medium 922 or other media into a field of the RAM 918 to execute software programs. Data may be stored in the RAM 918, where the data may be accessed by the computer CPU 902 during execution.
The storage medium 922 itself may include a number of physical drive units, such as a redundant array of independent disks (RAID), a floppy disk drive, a flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a High-Density Digital Versatile Disc (HD-DVD) optical disc drive, an internal hard disk drive, a Blu-Ray optical disc drive, or a Holographic Digital Data Storage (HDDS) optical disc drive, an external mini-dual in-line memory module (DIMM) synchronous dynamic random access memory (SDRAM), or an external micro-DIMM SDRAM. Such computer readable storage media allow a computing device to access computer-executable process steps, application programs and the like, stored on removable and non-removable memory media, to off-load data from the device or to upload data onto the device. A computer program product, such as one utilizing a communication system may be tangibly embodied in storage medium 922, which may include a machine-readable storage medium.
According to one example implementation, the term computing device, as used herein, may be a CPU, or conceptualized as a CPU (for example, the CPU 902 of
In example implementations of the disclosed technology, a computing device may include any number of hardware and/or software applications that are executed to facilitate any of the operations. In example implementations, one or more I/O interfaces may facilitate communication between the computing device and one or more input/output devices. For example, a universal serial bus port, a serial port, a disk drive, a CD-ROM drive, and/or one or more user interface devices, such as a display, keyboard, keypad, mouse, control panel, touch screen display, microphone, etc., may facilitate user interaction with the computing device. The one or more I/O interfaces may be used to receive or collect data and/or user instructions from a wide variety of input devices. Received data may be processed by one or more computer processors as desired in various implementations of the disclosed technology and/or stored in one or more memory devices.
One or more network interfaces may facilitate connection of the computing device inputs and outputs to one or more suitable networks and/or connections; for example, the connections that facilitate communication with any number of sensors associated with the system. The one or more network interfaces may further facilitate connection to one or more suitable networks; for example, a local area network, a wide area network, the Internet, a cellular network, a radio frequency network, a Bluetooth enabled network, a Wi-Fi enabled network, a satellite-based network any wired network, any wireless network, etc., for communication with external devices and/or systems.
As used in this application, the terms “component,” “module,” “system,” “server,” “processor,” “memory,” and the like are intended to include one or more computer-related units, such as but not limited to hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
Certain embodiments and implementations of the disclosed technology are described above with reference to block and flow diagrams of systems and methods and/or computer program products according to example embodiments or implementations of the disclosed technology. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, may be repeated, or may not necessarily need to be performed at all, according to some embodiments or implementations of the disclosed technology.
These computer-executable program instructions may be loaded onto a general-purpose computer, a special-purpose computer, a processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions that execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flow diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks.
As an example, embodiments or implementations of the disclosed technology may provide for a computer program product, including a computer-usable medium having a computer-readable program code or program instructions embodied therein, said computer-readable program code adapted to be executed to implement one or more functions specified in the flow diagram block or blocks. Likewise, the computer program instructions may be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flow diagram block or blocks.
Accordingly, blocks of the block diagrams and flow diagrams support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions, and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, can be implemented by special-purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special-purpose hardware and computer instructions.
In this description, numerous specific details have been set forth. It is to be understood, however, that implementations of the disclosed technology may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description. References to “one embodiment,” “an embodiment,” “some embodiments,” “example embodiment,” “various embodiments,” “one implementation,” “an implementation,” “example implementation,” “various implementations,” “some implementations,” etc., indicate that the implementation(s) of the disclosed technology so described may include a particular feature, structure, or characteristic, but not every implementation necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one implementation” does not necessarily refer to the same implementation, although it may.
Throughout the specification and the claims, the following terms take at least the meanings explicitly associated herein, unless the context clearly dictates otherwise. The term “connected” means that one function, feature, structure, or characteristic is directly joined to or in communication with another function, feature, structure, or characteristic. The term “coupled” means that one function, feature, structure, or characteristic is directly or indirectly joined to or in communication with another function, feature, structure, or characteristic. The term “or” is intended to mean an inclusive “or.” Further, the terms “a,” “an,” and “the” are intended to mean one or more unless specified otherwise or clear from the context to be directed to a singular form. By “comprising” or “containing” or “including” is meant that at least the named element, or method step is present in article or method, but does not exclude the presence of other elements or method steps, even if the other such elements or method steps have the same function as what is named.
As used herein, unless otherwise specified the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
While certain embodiments of this disclosure have been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that this disclosure is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
This written description uses examples to disclose certain embodiments of the technology and also to enable any person skilled in the art to practice certain embodiments of this technology, including making and using any apparatuses or systems and performing any incorporated methods. The patentable scope of certain embodiments of the technology is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal language of the claims.
It will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and foregoing description thereof, without departing from the substance or scope of the invention.
Osborn, Kevin, Maiman, Tyler, Lutz, Wayne, Gabriele, David, Cheng, Lin Ni Lisa, Sangi, Saleem Ahmed, Marsch, Daniel John
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7079008, | Jul 31 2001 | HEWLETT-PACKARD DEVELOPMENT COMPANY L P | Proximity transaction control method |
7423525, | Jul 28 2005 | Symbol Technologies, LLC | Method and apparatus for a product information interface utilizing radio frequency identification (RFID) technology |
7474196, | Feb 20 2003 | RPX Corporation | Apparatus, system, method and computer program product for implementing an automatic identification system with a personal communication system to improve functionality |
7486171, | May 23 2005 | Samsung Electronics Co., Ltd. | RFID tag, system for purchasing service by using RFID tag, and method thereof |
7541930, | Jun 14 2005 | III HOLDINGS 3, LLC | Apparatus and method for controlling diverse short-range antennas of a near field communications circuit |
8214910, | Oct 26 2011 | GOOGLE LLC | Obscuring an accelerometer signal |
8281335, | May 03 2002 | Time Warner Cable LLC | Use of multiple embedded messages in program signal streams |
8325020, | Jan 31 2008 | Microsoft Technology Licensing, LLC | Unique identification of devices using color detection |
8380246, | Mar 01 2007 | Microsoft Technology Licensing, LLC | Connecting mobile devices via interactive input medium |
8612767, | Oct 26 2011 | GOOGLE LLC | Obscuring an accelerometer signal |
8618932, | Mar 18 2011 | Microsoft Technology Licensing, LLC | Device location detection |
8638190, | Feb 02 2012 | GOOGLE LLC | Gesture detection using an array of short-range communication devices |
8922348, | Jun 03 2013 | The Boeing Company | Radio frequency identification notification system |
9021270, | May 31 2012 | GOOGLE LLC | Combining wake-up and unlock into a single gesture |
9113235, | Nov 14 2012 | Symbol Technologies, LLC | Device and method for functionality sequencing |
9219979, | Aug 15 2011 | Connectquest LLC | Beacon for close proximity notification system |
9460573, | Feb 27 2014 | T-MOBILE INNOVATIONS LLC | Autonomous authentication of a reader by a radio frequency identity (RFID) device |
9531858, | Feb 27 2012 | Sony Corporation | Methods of responding to an orientation or motion of a portable electronic device, and related devices |
9538332, | Apr 12 2005 | GAMBA GROUP HOLDINGS LLC | Beacon deployment for use with location based services (LBS) |
9538370, | Aug 24 2012 | SAMSUNG ELECTRONICS CO , LTD | Data transmission method for terminal performing near field communication and terminal thereof |
9564950, | Jul 26 2013 | HUAWEI DEVICE CO ,LTD | Tag identification method and apparatus |
9569163, | Dec 30 2011 | Microsoft Technology Licensing, LLC | Mobile device pairing |
9571164, | Jun 21 2013 | RSA Security LLC | Remote authentication using near field communication tag |
9571956, | Dec 30 2011 | Microsoft Technology Licensing, LLC | Mobile device pairing |
9578481, | Dec 30 2011 | Microsoft Technology Licensing, LLC | Mobile device pairing |
9633243, | Jul 19 2013 | GEOTOLL, INC. | Method and apparatus for facilitating a wireless transaction event via a RFID tag device with a mobile device |
9641969, | Jul 25 2014 | General Electric Company | Wireless bridge hardware system for active RFID identification and location tracking |
20040176032, | |||
20050033619, | |||
20050160003, | |||
20060094405, | |||
20060094411, | |||
20060094412, | |||
20060293069, | |||
20070075133, | |||
20070109103, | |||
20080030304, | |||
20080094217, | |||
20080191878, | |||
20090036165, | |||
20100075601, | |||
20100090831, | |||
20100156609, | |||
20100294835, | |||
20110084811, | |||
20110212687, | |||
20110212688, | |||
20110215902, | |||
20120059741, | |||
20120075068, | |||
20120105200, | |||
20120127976, | |||
20120190301, | |||
20120223815, | |||
20120316950, | |||
20130002405, | |||
20130021139, | |||
20130065526, | |||
20130109369, | |||
20130110657, | |||
20130166399, | |||
20130225079, | |||
20130229265, | |||
20130237152, | |||
20130244575, | |||
20130257804, | |||
20130281014, | |||
20130288594, | |||
20130303085, | |||
20130309964, | |||
20130311313, | |||
20130335201, | |||
20140085090, | |||
20140201086, | |||
20140203918, | |||
20140256249, | |||
20150002275, | |||
20150019432, | |||
20150032603, | |||
20150140982, | |||
20150161641, | |||
20150215737, | |||
20150294210, | |||
20150304804, | |||
20160277999, | |||
20160316317, | |||
20160360348, | |||
20160379269, | |||
20170006440, | |||
20170071018, | |||
20170091496, | |||
20170228776, | |||
20170236345, | |||
20170251334, | |||
20170308692, | |||
20180014187, | |||
20180027208, | |||
20180054735, | |||
20190068247, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 30 2019 | GABRIELE, DAVID | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 30 2019 | LUTZ, WAYNE | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 30 2019 | CHENG, LIN NI LISA | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 30 2019 | MAIMAN, TYLER | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 30 2019 | OSBORN, KEVIN | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 31 2019 | Capital One Services, LLC | (assignment on the face of the patent) | / | |||
May 31 2019 | MARSCH, DANIEL JOHN | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 | |
May 31 2019 | SANGI, SALEEM AHMED | Capital One Services, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049338 | /0018 |
Date | Maintenance Fee Events |
May 31 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Sep 21 2023 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 07 2023 | 4 years fee payment window open |
Oct 07 2023 | 6 months grace period start (w surcharge) |
Apr 07 2024 | patent expiry (for year 4) |
Apr 07 2026 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 07 2027 | 8 years fee payment window open |
Oct 07 2027 | 6 months grace period start (w surcharge) |
Apr 07 2028 | patent expiry (for year 8) |
Apr 07 2030 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 07 2031 | 12 years fee payment window open |
Oct 07 2031 | 6 months grace period start (w surcharge) |
Apr 07 2032 | patent expiry (for year 12) |
Apr 07 2034 | 2 years to revive unintentionally abandoned end. (for year 12) |